1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
9

Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until t

he user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.
Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
4 0

Answer:

mylist = [] #Create an empty list

i = 0 # initialize counter to 0

b = int(input("Enter into list: ")) # prompt user for input

while not(b == 0): #test if input is not 0

mylist.append(b) #insert input into list if it's not 0

i = i + 1 #increment counter

b = int(input("Enter into list: ")) #prompt user for input

#save sorted list in a newlist

newlist = sorted(mylist)

#print element on separate lines

for ind in newlist:

print(ind)

#End of program

Explanation:

Line 1 of the program creates an empty list named mylist

Line 2, initializes a counter variable i to 0

Line 3 prompts user for input

Line 4 to 7 iterates until user input is 0

Line 9 sorts the list and saves the sorted list into a new list

Line 11 & 12 prints the each element of the list on separate lines

You might be interested in
Types of computer viruses<br>​
e-lub [12.9K]

Answer:anti various

Explanation:hope fully this will help u

5 0
3 years ago
Read 2 more answers
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
Which Artificial Intelligence (AI) term is used to describe extracting information from unstructured text using algorithms?
Alla [95]

Answer:

The most basic and useful technique in NLP is extracting the entities in the text. It highlights the fundamental concepts and references in the text. Named entity recognition (NER) identifies entities such as people, locations, organizations, dates, etc. from the text.

5 0
3 years ago
Ill give you brainiest.
quester [9]
Hey there,

I believe that your correct answer would be that "<span> some people will tell you what they think you want to hear </span>". When you ask someone about the perceptions of your person trait, they will most likely <span>tell you what they think you want to hear because its what they want to make you happy. 

For example: Jimmy ask billy "Am I fat Billy"

                      Billy tells Jimmy "No, Your not fat, you look just great".

                         But really, Jimmy is very fat.

The point is that people are going to say things that make you feel happy and something that you want to hear.

~Jurgen</span>
6 0
4 years ago
Write a static method named anglePairs that accepts three angles (integers), measured in degrees, as parameters and returns whet
padilas [110]

Answer:

The java program for the scenario is given below.  

import java.util.*;

public class Test

{

// method returning sum of all digits in the integer parameter

static boolean anglePairs(int a1, int a2, int a3)

{

   // variable to hold sum of two complementary angles

   int comp=90;  

   // variable to hold sum of two supplementary angles

   int supp=180;

   // boolean variable to hold result

   boolean result = false;

   if( (a1+a2 == comp) || (a2+a3 == comp) || (a1+a3 == comp) )

   {

       if( (a1+a2 == supp) || (a2+a3 == supp) || (a1+a3 == supp) )

           result = true;

       else

           result = false;

   }    

           // return variable result

       return result;

}

public static void main(String[] args)

{

   // method is called by passing three positive angles

   System.out.println("The pair of angles have both complementary and supplementary angles " + anglePairs(100, 80, 90) );    

}

}

OUTPUT

The pair of angles have both complementary and supplementary angles false

Explanation:

The program works as described below.

1. The method, anglePairs(), is declared as static having return type as Boolean which takes three positive integer parameters.

static boolean anglePairs(int a1, int a2, int a3)

{

}

2. The integer variable, comp, is declared and initialized to 90.

3. The integer variable, supp, is declared and initialized to 180.

4. The Boolean variable, result, is declared and initialized to false.

5. Using if-else statements, sum of two angles are compared with the variables, comp and supp.

6. If the sum of any two angles match with both, comp and supp, variables, the Boolean variable, result is assigned value true. Otherwise, result is assigned value false.

7. The value of result is returned.

8. Inside main() method, the function anglePairs() is called and three positive numerical values are passed as parameters.  The output is displayed.

9. All the above code is written inside the class Test.

10. User input is not taken since it is not mentioned in the question.

8 0
4 years ago
Other questions:
  • PLEASE HELP
    14·2 answers
  • A group of students want to create an educational online game for computer laboratory in their school which type of network will
    6·1 answer
  • If you need assistance with your I-20 which phone number at UC would you call?
    10·1 answer
  • You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
    8·2 answers
  • a paragraph is a segment of text with the same format that begins when you press the enter key and ends when you press enter key
    6·2 answers
  • Write a loop that inputs words until the user enters STOP. After each input, the program should number each entry and print in t
    12·1 answer
  • Problem 5. (Greatest Common Divisor) Write a program gcd.py that accepts p (int) and q (int) as command-line arguments, and writ
    13·1 answer
  • You are creating a web page as part of a science project. Your role is to put your data on the webpage. You tracked the growth o
    12·2 answers
  • Instant Search can NOT be used to search through archived messages.
    6·1 answer
  • Which tools can help you gather information about the processes running on a windows operating system?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!